Security

By Grayde Bowen | 03/07/2023

How Common Are Prosecutions For Data Breaches?

The UK legislation on what data security measures should be in place and who to report a suspected breach to is covered by GDPR.   …

Read post

By Grayde Bowen | 26/06/2023

Passkey Verification

Passkey verification is starting to move away from bespoke network access solutions to a wider Internet access model.  It is supported by IOS 16 …

Read post

By Grayde Bowen | 19/06/2023

Fighting Fake Reviews

Kindus has already discussed the UK Digital Markets, Competition and Consumers Bill which includes provisions to ensure that sites take reasonable steps to ensure …

Read post

By Grayde Bowen | 13/06/2023

UK Smart Device Security Law

The UK Product Security and Telecommunications Infrastructure (Product Security) regime will come into force on 29th April 2024.  This aims to improve security software …

Read post

By Grayde Bowen | 08/06/2023

Smart Speaker Data Leaks

Amazon Alexa, Apple Siri and Google Assistant all offer voice activated assistance.  Similar technology such as the Ring doorbell also include cameras so can …

Read post

By Grayde Bowen | 30/05/2023

Shoulder Surfing Mobile Device Fraud

With increasing use of mobile devices for banking and contactless payment a small but significant threat has emerged from loss of the phone together …

Read post

By Grayde Bowen | 25/04/2023

TikTok Restrictions

Following a security review the UK announced in March 2023 that TikTok would be banned on government devices.  While this action has some elements …

Read post

By Grayde Bowen | 21/03/2023

Cyber Essentials 2023 Changes

Cyber Essentials the UK cyber security certification is to be updated on 24th April 2023.  This will mean new questions but existing certifications will …

Read post

By Grayde Bowen | 28/02/2023

Protective Domain Name Service (PDNS)

PDNS is designed to protect networks from malicious websites by looking up the IP address of sites that a system tries to access against …

Read post

By Grayde Bowen | 21/02/2023

DMARC Email Protection

Fraudsters and scammers often send email by falsifying the sender’s address.  If the sender appears to be trustworthy then the recipient is more likely …

Read post

By Grayde Bowen | 14/02/2023

Browser Vulnerabilities

The Chrome browser and its derivatives Opera and Edge were recently (January 2023) found to be vulnerable to Symstealer an attack that can be …

Read post

By Grayde Bowen | 07/02/2023

Password Manager Risks

It would be hard to argue against the case for password managers.  Instead of needing to remember numerous passwords or even worse using the …

Read post

By Grayde Bowen | 31/01/2023

Protecting Networked Devices

IoT devices have become an important part of the communications infrastructure.  Consider for example routers, printers, web cams or industrial control devices.  In the …

Read post
Banknote - 50.000.000 Mark - Deutsches Reich - 25.07.1923 Public Domain

By Grayde Bowen | 24/01/2023

PayPal Security Loophole

Criminals see PayPal related messages as an easy route for fraud.  Many such requests are quick to spot as they do not relate to …

Read post

By Grayde Bowen | 10/01/2023

Evaluating the Threat from Quantum Computing

The core principle of most computer encryption is not that a code cannot be broken but that the time required to guess the key …

Read post

By Grayde Bowen | 03/01/2023

Digital Advertising Fraud

The most efficient way to host advertising on web pages or social media is through some form of programmatic advertising.  The owner (publisher) of …

Read post
FIFA World Cup trophy in Italy Creative Commons

By Grayde Bowen | 06/12/2022

Qatar World Cup Cyber Attacks

It is no surprise that a major International event such as the 2022 World Cup would be a magnet for fraudsters and scammers.  This …

Read post
GNU License Graphical reconstruction of Mammut americanum based on bony structure and paleontological texts

By Grayde Bowen | 22/11/2022

Mastodon Security

Some Twitter users have been considering moving to other, similar, platforms.  Twitter has a massively larger subscriber base than any of the alternative services. …

Read post

By Grayde Bowen | 07/11/2022

Home Phones at Work?

There needs to be a clear line between device use for personal and work purposes.  This will include phone calls, emails and application use.  …

Read post

By Grayde Bowen | 31/10/2022

Social Media Workplace Risks

For many young and not so young workers social media is an important part of their lifestyle.  They do not simply want to consume …

Read post

Sign Up

Sign up to our newsletter list here.

    Successful sign up

    Thank you for signing up to our newsletter list.

    Check your inbox for all the latest information from Kindus

    Categories